The acceleration of mobile transactions, coupled with the free distribution of downloadable apps, can create significant security and management challenges. The combination of apps — sometimes installed from nontrustworthy sources — and the increase of mobile malware poses a real threat to both sensitive and confidential information stored on mobile devices.

Why Worry About Mobile Banking Transactions?

Mobile banking is an attractive target for criminal account takeover due to the rapidly growing number of users and limited fraud detection and prevention capabilities. It is also being exploited to circumvent strong authentication systems that use mobile text messages to validate high-risk transactions.

So it is no surprise that new European and global legislation is aggressively pushing for instant payments, which puts greater emphasis on financial institutions’ fraud detection and prevention in near-real time. Previous processes that allowed banks to either stop or recover transferred funds are now being eradicated, putting pressure on how to detect fraud that is occurring at the time of the transaction.

To successfully combat these constant threats, banks and financial institutions need a new paradigm — one that provides effective, nonintrusive and frictionless banking. This model must be easy to implement, manage and operate, require limited operational support and be highly adaptable to address new threats. This tiered approach must incorporate new countermeasures without any intervention by bank security staff and without any noticeable impact to banking customers.

Read the white paper to learn more: Mobile Malware Adapting PC Threat Techniques

Evaluating Mobile Device Trustworthiness

Building popular apps means being able to support a broad range of operating environments and devices. This also means that the app is exposed to potential vulnerabilities across supported devices. While Apple provides regular updates to its closed apps universe, the same can’t be said for Android’s open platform ecosystem.

Owners sometimes jailbreak their devices so they can access traditionally locked-down device capabilities, so no singular device or OS is safe. A device’s trustworthiness must always be questioned — and it is a crucial element to consider when addressing transactions performed from it.

Solutions include an embedded, dedicated security library for both Apple’s iOS and Google’s Android platforms in which a variety of parameters are scrutinized in order to provide a calculated security posture. It also generates a unique and persistent device ID. When embedding this library, the application can use device risk factors to restrict functionality on questionable devices, preventing high-risk transactions from being generated in the first place.

Safeguarding Devices

When building and deploying applications, there are common development and testing practices used. While these are excellent security procedures to follow, cybercriminals don’t need to prey upon security flaws in the application to exploit it. Off-the-shelf packers provide access to the mobile binary, exposing the internal workings of the application code and enabling attackers to access, modify, rebuild and deploy malicious code without the transaction service being aware. It also leaves the door wide open for malware and tampering.

Solutions include special guards or security units that are injected into the binary so that they cannot be identified or isolated. They defend against compromise by either obfuscating or scrambling the code. At runtime, they can check the environment in which the application is running to guarantee it’s not running on a rooted or jailbroken device or in the presence of debuggers.

Finally, ensure that the application is running as it’s designed. If it’s not, malware could be altering the behavior of your app.

Establishing User Identification

A commonly used user identification method relies on profiling as a means of identifying fraudulent transactions. Due to the statistical nature of some approaches, false negatives and false positives frequently occur. Cybercriminals take many steps to perform fraudulent transactions under the radar of this security layer, exhibiting as many characteristics of normal, customer-generated transactions as possible.

For example, cybercriminals use social engineering to fool end users into downloading SMS forwarders that will be later used to authenticate fraudulent transactions. In other attacks, malware is used to inject fraudulent transactions into fully authenticated, valid banking sessions while hiding the transaction and the resulting account balance information from the end user.

The device needs to be the first line of defense for online transactions since it is traditionally considered the weakest link. For example, organizations could use SIM card information as a means of identifying the user because it forms an anchor of mobile devices worldwide. The SIM card protects the mobile identity of subscribers, associates devices with phone numbers and stores payment credentials in NFC-enabled phones with mobile wallets.

Protecting Session Information

Today’s malware includes a wide variety of attack types. Data- and credential-stealing malware comes in the form of fake applications, SMS stealers and PC/mobile combination malware. Mobile malware can dynamically change the user experience by creating an overlay of a malicious screen on top of the legitimate application — one that the unknowing user will seamlessly interact with. This allows the extraction of personal identifiable information and personal data.

The previously mentioned dedicated security library for both iOS and Android platforms could help in this regard by inspecting certain session information. The examined information would include malware on the device, suspicious or fake apps, outdated operating systems and jailbroken/rooted information.

Preventing Cross-Channel Infections

A cross-channel infection is an infection on the mobile device caused by malware on the user’s PC. A message will appear on the user’s PC from a trusted service provider such as a bank or social media platform and it will prompt the user to carry out an action. Once users provide a phone number or scan a QR code, they receives an SMS with a link to install a so-called security app. Instead, this link downloads a malicious app that is actually an extension of the PC malware.

Cross-channel infections can be prevented with help from information on the device’s geolocation, which is based on GPS data or IP location. This can be used to detect access to the same account from two distinct locations or other anomalies that may occur during the online banking session. Additional information is analyzed to identify suspicious events across time, users and activities — for example, phishing, malware and other high-risk indicators are combined to provide a contextual picture of anomalous account activity.

By combining a traditional risk score approach with a deep knowledge of current methods of operations used by fraudsters, you can receive an evidence-based answer on whether a transaction is fraudulent.

VIDEO: Mitigate Multiple Attack Vectors with IBM Security Trusteer Mobile Solutions

More from Banking & Finance

How the ZeuS Trojan Info Stealer Changed Cybersecurity

4 min read - Information stealer malware is a type of malicious software designed to collect sensitive information from a victim’s computer. Also known as info stealers, data stealers or data-stealing malware, this software is true to its name: after infecting a computer or device, it’s highly adept at exfiltrating login credentials, financial information and personal data. Info stealers typically operate by monitoring keyboard input, capturing screenshots and intercepting network traffic. They may also search a hard drive for specific types of data. The…

4 min read

2022 Industry Threat Recap: Finance and Insurance

5 min read - The finance and insurance sector proved a top target for cybersecurity threats in 2022. The IBM Security X-Force Threat Intelligence Index 2023 found this sector ranked as the second most attacked, with 18.9% of X-Force incident response cases. If, as Shakespeare tells us, past is prologue, this sector will likely remain a target in 2023. Finance and insurance ranked as the most attacked sector from 2016 to 2020, with the manufacturing sector the most attacked in 2021 and 2022. What…

5 min read

How to Spot a Nefarious Cryptocurrency Platform

4 min read - Do you ever wonder if your cryptocurrency platform cashes in ransomware payments? Maybe not, but it might be worth investigating. Bitcoin-associated ransomware continues to plague companies, government agencies and individuals with no signs of letting up. And if your platform gets sanctioned, you may instantly lose access to all your funds. What exchanges or platforms do criminals use to cash out or launder ransomware payments? And what implications does this have for people who use exchanges legitimately? Blacklisted Exchanges and Mixers…

4 min read

Kronos Malware Reemerges with Increased Functionality

6 min read - The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

6 min read